AIセキュリティポータルbot

Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness

Authors: Siyuan Li, Xi Lin, Yaju Liu, Jianhua Li | Published: 2024-05-09
Bias
Privacy Protection
Prompt Injection

LLMPot: Dynamically Configured LLM-based Honeypot for Industrial Protocol and Physical Process Emulation

Authors: Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos | Published: 2024-05-09 | Updated: 2025-05-19
ICS Honeypot Development
Dataset Generation
Model Performance Evaluation

Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems

Authors: Amin Aminifar, Matin Shokri, Amir Aminifar | Published: 2024-05-09 | Updated: 2024-09-13
Edge Computing
Privacy Protection Method
Communication Efficiency

Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM

Authors: Xikang Yang, Xuehai Tang, Songlin Hu, Jizhong Han | Published: 2024-05-09
LLM Security
Prompt Injection
Attack Method

TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans

Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | Published: 2024-05-09
Layout Security
Threat modeling
Defense Method

Model Inversion Robustness: Can Transfer Learning Help?

Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09
Privacy Protection Method
Membership Inference
Defense Method

Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models

Authors: Yang Bai, Ge Pei, Jindong Gu, Yong Yang, Xingjun Ma | Published: 2024-05-09 | Updated: 2024-05-20
LLM Security
Watermarking
Weapon Ownership

PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks

Authors: Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma | Published: 2024-05-09
LLM Security
Cybersecurity
Anomaly Detection Method

Analysis and prevention of AI-based phishing email attacks

Authors: Chibuike Samuel Eze, Lior Shamir | Published: 2024-05-08
Dataset Generation
Phishing Detection
Machine Learning Method

Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope Theory

Authors: Pasan Dissanayake, Sanghamitra Dutta | Published: 2024-05-08 | Updated: 2024-11-05
Model Performance Evaluation
Model Extraction Attack
Watermark Evaluation